SlideShare a Scribd company logo
Recognizing the fact usernames passwords are the weakest link
in an organization’s security system because username and
password are shareable, and most passwords and usernames are
vulnerable and ready to be cracked with a variety of methods
using adopting a record number of devices and platforms
connected to the Internet of Things daily and at an alarming
rate.
Provide the all-inclusive and systematic narratives of the
impact of physical biometric operations on the current and
future generation.
An Integrated Approach of Physical Biometric Authentication
System
Objective
Per Fennelly (2017), every human being is created differently
with physical and behavioral traits that are unique; and
everyone’s fingerprints, iris, facial feature and body types are
entirely different from one another. The effective and efficient
use of biometric technology will play a key role in automating
a new method of identifying living person based on individual
physiological and behavioral characteristics. Protecting
sensitive information from vulnerable access by unauthorized
users is paramount in our digital world and attempting to
identify and mitigating such operation is becoming very
challenging and troubling to the entire human society.
Biometric authentication-based identity is playing a vital role
in security operations. Traditional authentication approach used
to identity logon, logout, username, passwords are no longer
enough to battle the identity and security crisis. Physical
Biometric processes often allow the authentication of an
individual personal data to be stored in a document format for
future references. The comparison is often used to determine
whether the biometric characteristics of individual match the
previously information recorded in the document. Physical
biometric systems have proven to be very effective in
verification and identification processes.
Physical biometric identification and recognition processes are
classified in three groupings including acquisition, feature
extraction and comparison. Traditionally, biometric
characteristics are acquired through measurements, such as a
camera, microphone, fingerprint scanner, gathering of specific
characteristics and creation of digital representation,
photograph, a voice recording and scanned fingerprint. Most
naturally significant areas supporting physical biometric
process include corners of the eyes, mouth, nose, chin and
likely to be identified by human inspection and through an
automated biometric process.
Biometric Access Control is a security system used to provides
conditional access after scanning for unique physical
characteristics including installing Biometric Access at ATM’s
and other public facilities to safeguard financial data. Indeed,
when faces, fingers, irises and veins are scanned such data are
converted into digital format and a complex algorithm is used
to make a match. Such physical biometric processes appear to
certify as foolproof with no chance of being misused and often
confirm homeowners, financial institutions, public and private
organization. Technology infiltrating has rearranged every
facet of modern living and the global society has become
progressively digitized, protective of confidential information,
such as username and password. Prior to biometric operations,
username and password were enough to provide adequate
security to organization’s data security data. Today, in our
modern age, username, password and keys are becoming
increasingly feeble and appealing to sophisticated criminals.
Undoubtedly, passwords are the weakest link in an
organization’s security system because username and password
are shareable, and most passwords and usernames are
vulnerable and ready to be cracked with a variety of methods.
Physical biometrics continue to remain very concerned with a
record number of devices and platforms connected to the
Internet of Things daily and at an alarming rate. Recognizing
the magnitude of the plethora of devices such as smartphones,
tablets, sensors, cloud-based services and more sending and
receiving information continuously, time has come to keep
vital data out of the hands of high-tech criminals and
unauthorized users. It is worth noting that username and
passwords are unwieldy because even authorized officials use
the same username and password on multiple devices and
create ample opportunities for perpetrators to avail themselves
with and accepting the fact that human error are inevitable.

More Related Content

PDF
Hazards of Biometric Authentication in Practice
PPTX
Biometric security using cryptography
DOC
13 biometrics - fool proof security
PPT
PDF
Biometric and cyber security 1
PDF
Biometric System and Recognition Authentication and Security Issues
PPTX
Biometric Systems
Hazards of Biometric Authentication in Practice
Biometric security using cryptography
13 biometrics - fool proof security
Biometric and cyber security 1
Biometric System and Recognition Authentication and Security Issues
Biometric Systems

Similar to Recognizing  the fact usernames passwords are the weakest link in an.docx (20)

PDF
Biometric encryption
PDF
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
PDF
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
PPTX
Bio-Metrics through finger print
PPTX
kuchtohhainayacnayjdhcxjxnusbxjnxjsbxhsjnkxbs.pptx
DOCX
Cybersecurity governance-1.docx
PPT
Bio Metrics
DOCX
Biometric Authentication Technology - Report
PPTX
Biometric security tech
PDF
IRJET - A Review of Cyber Security using Biometric Devices
PDF
Av26303311
DOCX
Biometric Analytics: Next-Gen Authentication
PDF
Transparent User Authentication Biometrics Rfid And Behavioural Profiling 1st...
PPT
Biometrics - Chapter 1 Introduction.pptx
PDF
Two-factor authentication- A sample writing _Zaman
PDF
Security Issues Related to Biometrics
PDF
NEC Public Safety | Biometric for Safer Cities
PPT
Ecrime Practical Biometric
PPT
Biometric Access Control Systems
PDF
Biometrics system penetration in mobile devices
Biometric encryption
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
Bio-Metrics through finger print
kuchtohhainayacnayjdhcxjxnusbxjnxjsbxhsjnkxbs.pptx
Cybersecurity governance-1.docx
Bio Metrics
Biometric Authentication Technology - Report
Biometric security tech
IRJET - A Review of Cyber Security using Biometric Devices
Av26303311
Biometric Analytics: Next-Gen Authentication
Transparent User Authentication Biometrics Rfid And Behavioural Profiling 1st...
Biometrics - Chapter 1 Introduction.pptx
Two-factor authentication- A sample writing _Zaman
Security Issues Related to Biometrics
NEC Public Safety | Biometric for Safer Cities
Ecrime Practical Biometric
Biometric Access Control Systems
Biometrics system penetration in mobile devices

More from danas19 (20)

DOCX
Recognizing Fallacies Constructing sound arguments requires .docx
DOCX
Recognizing Written ArgumentFor this weeks discussion, Id like.docx
DOCX
Recognizing the fact usernames passwords are the weakest link in.docx
DOCX
Recognizing ArgumentsIn this assignment, you will apply key co.docx
DOCX
Recognition, Reification, and Practices of ForgettingEthica.docx
DOCX
Recipe Format for Café Laura (and HM courses)Header Information.docx
DOCX
Recently, several flyers were found near the campus of the Universit.docx
DOCX
Recently, Kathy Smith, a project manager for a large industrial cons.docx
DOCX
Recently your facility has had patient complaints about staff posing.docx
DOCX
Recently, I built a floating bed frame for my room. I watched a qu.docx
DOCX
Recently, a US Circuit Court upheld the enforceability of Website .docx
DOCX
Recently police departments across the nation has been accused o.docx
DOCX
Recently Capital One experienced scandal1.  Understand what.docx
DOCX
Recall a time when you received bad news, either in your academic or.docx
DOCX
Recent genetics research on leadership by Dr. Richard Avey suggests .docx
DOCX
Receiving funding from a grant or other source of funds is a great a.docx
DOCX
ReceivedRevisedAcceptedISSN 1307-9298Copyr.docx
DOCX
Received 9 December 2017 Revised 19 September 2018 Accepted.docx
DOCX
Recall that the goal of the Kyoto Protocol was to cut developed co.docx
DOCX
Recall aclinicallearning experience you enjoyed.De.docx
Recognizing Fallacies Constructing sound arguments requires .docx
Recognizing Written ArgumentFor this weeks discussion, Id like.docx
Recognizing the fact usernames passwords are the weakest link in.docx
Recognizing ArgumentsIn this assignment, you will apply key co.docx
Recognition, Reification, and Practices of ForgettingEthica.docx
Recipe Format for Café Laura (and HM courses)Header Information.docx
Recently, several flyers were found near the campus of the Universit.docx
Recently, Kathy Smith, a project manager for a large industrial cons.docx
Recently your facility has had patient complaints about staff posing.docx
Recently, I built a floating bed frame for my room. I watched a qu.docx
Recently, a US Circuit Court upheld the enforceability of Website .docx
Recently police departments across the nation has been accused o.docx
Recently Capital One experienced scandal1.  Understand what.docx
Recall a time when you received bad news, either in your academic or.docx
Recent genetics research on leadership by Dr. Richard Avey suggests .docx
Receiving funding from a grant or other source of funds is a great a.docx
ReceivedRevisedAcceptedISSN 1307-9298Copyr.docx
Received 9 December 2017 Revised 19 September 2018 Accepted.docx
Recall that the goal of the Kyoto Protocol was to cut developed co.docx
Recall aclinicallearning experience you enjoyed.De.docx

Recently uploaded (20)

PDF
Computing-Curriculum for Schools in Ghana
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Weekly quiz Compilation Jan -July 25.pdf
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PDF
01-Introduction-to-Information-Management.pdf
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
What if we spent less time fighting change, and more time building what’s rig...
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Cell Structure & Organelles in detailed.
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PPTX
master seminar digital applications in india
PPTX
Cell Types and Its function , kingdom of life
Computing-Curriculum for Schools in Ghana
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
202450812 BayCHI UCSC-SV 20250812 v17.pptx
STATICS OF THE RIGID BODIES Hibbelers.pdf
Weekly quiz Compilation Jan -July 25.pdf
UNIT III MENTAL HEALTH NURSING ASSESSMENT
01-Introduction-to-Information-Management.pdf
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Orientation - ARALprogram of Deped to the Parents.pptx
Microbial disease of the cardiovascular and lymphatic systems
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
What if we spent less time fighting change, and more time building what’s rig...
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Cell Structure & Organelles in detailed.
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Final Presentation General Medicine 03-08-2024.pptx
Practical Manual AGRO-233 Principles and Practices of Natural Farming
master seminar digital applications in india
Cell Types and Its function , kingdom of life

Recognizing  the fact usernames passwords are the weakest link in an.docx

  • 1. Recognizing the fact usernames passwords are the weakest link in an organization’s security system because username and password are shareable, and most passwords and usernames are vulnerable and ready to be cracked with a variety of methods using adopting a record number of devices and platforms connected to the Internet of Things daily and at an alarming rate. Provide the all-inclusive and systematic narratives of the impact of physical biometric operations on the current and future generation. An Integrated Approach of Physical Biometric Authentication System Objective Per Fennelly (2017), every human being is created differently with physical and behavioral traits that are unique; and everyone’s fingerprints, iris, facial feature and body types are entirely different from one another. The effective and efficient use of biometric technology will play a key role in automating a new method of identifying living person based on individual physiological and behavioral characteristics. Protecting sensitive information from vulnerable access by unauthorized users is paramount in our digital world and attempting to identify and mitigating such operation is becoming very challenging and troubling to the entire human society. Biometric authentication-based identity is playing a vital role
  • 2. in security operations. Traditional authentication approach used to identity logon, logout, username, passwords are no longer enough to battle the identity and security crisis. Physical Biometric processes often allow the authentication of an individual personal data to be stored in a document format for future references. The comparison is often used to determine whether the biometric characteristics of individual match the previously information recorded in the document. Physical biometric systems have proven to be very effective in verification and identification processes. Physical biometric identification and recognition processes are classified in three groupings including acquisition, feature extraction and comparison. Traditionally, biometric characteristics are acquired through measurements, such as a camera, microphone, fingerprint scanner, gathering of specific characteristics and creation of digital representation, photograph, a voice recording and scanned fingerprint. Most naturally significant areas supporting physical biometric process include corners of the eyes, mouth, nose, chin and likely to be identified by human inspection and through an automated biometric process. Biometric Access Control is a security system used to provides conditional access after scanning for unique physical characteristics including installing Biometric Access at ATM’s and other public facilities to safeguard financial data. Indeed, when faces, fingers, irises and veins are scanned such data are converted into digital format and a complex algorithm is used to make a match. Such physical biometric processes appear to certify as foolproof with no chance of being misused and often confirm homeowners, financial institutions, public and private organization. Technology infiltrating has rearranged every facet of modern living and the global society has become progressively digitized, protective of confidential information, such as username and password. Prior to biometric operations,
  • 3. username and password were enough to provide adequate security to organization’s data security data. Today, in our modern age, username, password and keys are becoming increasingly feeble and appealing to sophisticated criminals. Undoubtedly, passwords are the weakest link in an organization’s security system because username and password are shareable, and most passwords and usernames are vulnerable and ready to be cracked with a variety of methods. Physical biometrics continue to remain very concerned with a record number of devices and platforms connected to the Internet of Things daily and at an alarming rate. Recognizing the magnitude of the plethora of devices such as smartphones, tablets, sensors, cloud-based services and more sending and receiving information continuously, time has come to keep vital data out of the hands of high-tech criminals and unauthorized users. It is worth noting that username and passwords are unwieldy because even authorized officials use the same username and password on multiple devices and create ample opportunities for perpetrators to avail themselves with and accepting the fact that human error are inevitable.